Upload
tanner-raw
View
215
Download
2
Tags:
Embed Size (px)
Citation preview
Military Veterans as Information Security Professionals
March 12-13, 2015Mr. Sale Lilly
Operation PAVEPaving Access For Veterans Employment
Overview
• Operation PAVE Introduction, Fayetteville Partners• Growth of Cyber Attacks Predictable• Military Veterans As Part Of The Solution• Barriers• Conclusion
Cybersecurity WoesWhy is 2015 So Much Worse Than 1985?
Collaboration Not Compartmentalization
Point of Access: Hardware Not Software
Cold War Drove Espionage, Not Commerce
= Poorly Suited To Handle Intrusions in The Present
Images Descending: Steve Jobs and Steve Wozniak, Apple Lisa, Migs and St. Basils in Moscow
Personnel As Part of The SolutionWhy are Vets Culturally a Better Fit For Cybersecurity Roles?
Threat Constructionists By Training
Information Is Already Compartmentalized
Human Intelligence Assets Critical
= Culturally Suited To Handle Intrusions in The
FutureImages: Force Protection Conditions, Cover Sheets for Classified Information, KGB Spies Robert Hanssen/Aldrich Ames
Example: Initial Clue Of SpearPhising In Email Text, APT1 2013
We’ll tomorrow review the SharePoint training
Subject + Time + Verb + Object Time + Subject + Verb + Object
我们 明天 复习 连点培训
Example: Viruses and W32.Stuxnet
Target Acquisition CriteriaCollateral Damage ConsiderationsReal Time ‘Battle Damage Assessment’
INFECT
BENIGN
BENIGN
UNKNOWN
DESIGN
Military Employment BarriersWhy are Vets Not Filling Key Roles?
Geography & Location
Age (No Portfolio, Not Enough Mischief)
Knowledge
= Braking Effect On Veteran Impact in InfoSec Industry